• Complain

Matthew Bunn - A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes

Here you can read online Matthew Bunn - A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Cornell University Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Matthew Bunn A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes
  • Book:
    A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes
  • Author:
  • Publisher:
    Cornell University Press
  • Genre:
  • Year:
    2017
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Matthew Bunn: author's other books


Who wrote A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes? Find out the surname, the name of the author of the book and a list of all author's works by series.

A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Insider Threats
E DITED BY M ATTHEW B UNN
AND S COTT D. S AGAN
American Academy of
Arts and Sciences
Cambridge, Massachusetts
Cornell University Press
Ithaca and London
Contents
Contributors
Matthew Bunn is professor of practice and coprincipal investigator of the Project on Managing the Atom at the Belfer Center for Science and International Affairs, Harvard University.
Andreas Hoelstad Dhli is an Oslo-based independent researcher.
Kathryn M. Glynn is a consultant at IBM Global Business Services.
Thomas Hegghammer is the director of terrorism research at the Norwegian Defence Research Establishment (FFI).
Austin Long is an assistant professor at the School of International and Public Affairs and a member of the Arnold A. Saltzman Institute of War and Peace Studies at Columbia University.
Scott D. Sagan is the Caroline S. G. Munro Professor of Political Science and a senior fellow at the Center for International Security and Cooperation, Freeman Spogli Institute for International Studies at Stanford University.
Ronald Schouten is the director of the Law & Psychiatry Service of Massachusetts General Hospital and associate professor of psychiatry at Harvard Medical School.
Jessica Stern is a fellow at the FXB Center for Health and Human Rights at the Harvard School of Public Health and a lecturer in government at Harvard University.
Amy B. Zegart is the codirector of the Center for International Security and Cooperation; a senior fellow, by courtesy, at the Freeman Spogli Institute for International Studies; Davies Family Senior Fellow at the Hoover Institution; and professor, by courtesy, of political science at Stanford University.
Acknowledgments
This book would not have been possible without the assistance of many people and organizations. It has its origins in two workshops sponsored by the Global Nuclear Future project of the American Academy of Arts and Sciences, the first at Stanford University in 2011 and the second at the American Academy in Cambridge, Massachusetts, in 2014. We also thank the World Institute for Nuclear Security (WINS), which invited us to present our ideas at workshops in Vienna and Johannesburg. We are grateful to all those who participated in these workshops for contributing greatly to our thinking on the problem of insider threats. We have also given seminars on our work at the Los Alamos National Laboratory and the Sandia National Laboratory, and thank the participants in these meetings for sharing insights about the complex challenges we face when dealing with insider threats.
An earlier version of the concluding chapter, our Worst Practices Guide to Insider Threats, was published in 2013 as an occasional paper by the American Academy of Arts and Sciences. Our home institutions, the Managing the Atom (MTA) project at the Harvard Kennedy Schools Belfer Center for Science and International Affairs (BCSIA) and the Center for International Security and Cooperation (CISAC) at Stanford Universitys Freeman Spogli Institute for International Studies (FSI), both generously supported our efforts to research the insider problem. We thank our research assistantsNickolas Roth at Harvard and Anna Coll, Maral Mirshahi, and Reid Pauly at Stanfordfor their superb work in helping us with this project. We are especially grateful to Francesca Giovannini, the program director for Global Security and International Affairs at the American Academy of Arts and Sciences. The Academys work in this area has been generously supported by the Carnegie Corporation of New York, the John D. and Catherine T. MacArthur Foundation, the Hewlett Foundation, the Flora Family Foundation, and the Alfred P. Sloan Foundation. Finally, we owe a great debt to the authors of the individual chapters in this volume, who put in enormous efforts to provide their insights about and analyses of this particularly vexing set of dangers.
Introduction
Inside the Insider Threat
Matthew Bunn and Scott D. Sagan
Insider threats may be rare within most professional and competent organizations, and especially rare inside organizations that are responsible for protecting the national security of a country and its critical infrastructure. But not all national security organizations are as highly professional and competent as they claim to be, and devastating insider threats have sometimes occurred even within the best of the organizations that have sought to minimize the dangers. Rare does not mean nonexistent.
In this book, readers will encounter many rare but devastating cases of insider threats from around the globe: disloyal personal security guards murdering a prime minister in India; individual soldiers deliberately opening fire on their own military comrades or allied forces in the United States and Afghanistan; employees engaging in sabotage attacks on nuclear reactors in South Africa and Belgium; and a microbiologist working inside a sensitive U.S. biodefense facility and sending deadly anthrax spores through the mail in order to kill reporters and elected officials and terrorize the public. Nuclear materials, because of their dangerous radioactivity and their potential to be used in weapons, are usually considered to be the crown jewels of physical protection. However, insiders pose a serious threat to these materials as well: virtually all the cases of nuclear theft in which the circumstances are known were perpetrated either by insiders or with the help of insiders; also, given that many unsolved cases of nuclear theft involve bulk material stolen without anyone else in the organization being aware that the material was missing, there is every reason to believe that these thefts were also perpetrated by insiders who understood weaknesses in security systems and could cover their tracks afterward. Insiders have also perpetrated a large number of thefts from heavily guarded nonnuclear facilities.
It would be reassuring if the intelligence agencies and the armed services of the United States were immune to insider threats, but that is clearly not the case. Indeed, virtually all of the major U.S. intelligence agencies and branches of the military have also experienced an extremely damaging insider incident. Even a partial list is stunning:
  • Central Intelligence Agency officer Aldrich Ames sold secrets to the Soviet Union and Russia for almost ten years, compromising more than a hundred covert operations in exchange for $2.5 million before he was caught in 1994.
  • FBI counterintelligence officer Robert Hanssen passed on classified information to the Soviet Union and Russia for twenty-two years, from 1979 to 2001.
  • In 2012 and 2013, National Security Agency contractor Edward Snowdenwho had earlier worked for both the CIA and the Defense Intelligence Agencyleaked to the media thousands of classified U.S., British, and Australian documents about global surveillance practices and military operations.
  • From 1968 to 1984, U.S. Navy chief warrant officer John Anthony Walker led a four-person insider spy ring that passed on classified information and codebooks permitting the Soviets to read encrypted U.S. military messages.
  • In 1979, U.S. Air Force second lieutenant Christopher M. Cooke gave the Soviet Union the secret launch codes and flag words for the Strategic Air Commands nuclear ICBM force.
  • In early 2010, U.S. Army private Chelsea Manning (then known as Bradley Manning) leaked some 250,000 classified diplomatic cables and 500,000 U.S. Army reports and documents from the Iraq and Afghanistan wars to the WikiLeaks organization, which then posted most of them on the Internet.
The U.S. military services, intelligence agencies, secret service details, and nuclear security guard forces are supposed to be the best of the best; they are designed to be highly effective national security organizations. So it is significant that even they have suffered serious insider incidents. If the most elite organizations in the nation have had many serious problems in recognizing and dealing with insider threats, doesnt this suggest that other organizations will have even more serious difficulties?
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes»

Look at similar books to A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes»

Discussion, reviews of the book A Worst Practices Guide to Insider Threats: Lessons From Past Mistakes and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.